• Ei tuloksia

Network Architecture.

N/A
N/A
Info
Lataa
Protected

Academic year: 2022

Jaa "Network Architecture."

Copied!
87
0
0

Kokoteksti

(1)

Lecture #2- Computer Networks.Types and Applications.

Network Architecture.

C o n t e n t s

w Introduction

w Application of the Computer Networks

w Network Architecture - hardware and software

w Network Types

##

1 1

8787

(2)

Introduction - Terminology

Computer Network:

interconnected autonomous computers

explicit addressing and naming virtual

explicit allocation / reallocation memory

explicit remote management

Distributed System:

interconnected autonomous computers

transparent addressing virtual

transparent allocation and reallocation uniprocessor

transparent execution

##

2 2

8787

1/1 1/1 1/0

(3)

Application of the Computer Networks

w

Enterprise Networks (Intranets)

w

Public Networks

w

Personal Use

w

Social Aspects

##

3 3

87 87

(4)

Enterprise Networks (“Intranets ”)

w Resource Sharing - many computers in different places

w High Reliability - duplication of data, hardware resources, fault-tolerance

w Low Cost/Performance Ratio - cheaper

workstations than mainframes; application of the client-server model

w Scalability and Flexibility - system grows with the enterprise

1/1

##

4 4

87 87

1/1 1/1

(5)

Public Networks

w 2 preconditions: cheap and compact home computers and communication technologies

w Electronic commercial and banking,

entertainment, public and social services, mass media etc.

w Person-to-person communication

w Instances: WWW, E-mail, electronic

newspapers, on-line TV/Radio, newsgroups, videoconferencing etc.

##

5 5

87 87

(6)

Personal Use

w Moving all the services at home - shopping, banking, health, TV/radio/cinema/news-

papers etc.

w On-line information - “Browsing”,

“Surfing”, searching machines.

w Personal contacts and communication.

##

6 6

87 87

(7)

Social Issues

w Formal (Legislative) Regulation of service providing (incl. taxes, QoS/protection of customer rights, registration of

sites/addressing etc.)

w Electronic Payments and Security Issues

w Advertisement (incl. Internet,

“spaming”/“bombing”)

w Information Correctness

w Public control (illegal sex, trade, crimes)

Clinton’s Communication Decency Act - 1996

##

7 7

87 87

(8)

Network Hardware

w Main Taxonomy Dimensions:

F

transmission technology

F

network range (scale, size)

w Transmission Technology

F

broadcast networks

F

point-to point

##

8 8

87 87

(9)

Broadcast Networks

w Single communication channel shared by all the machines in the network

w Short messages (packets) with addressing field

w Target machine interprets current message;

the rest ignore it

w Special bits in the address field indicate the transmission mode: broadcast (to all the

machines); multicast (to group of machines)

##

9 9

87 87

(10)

Point-to-point Networks

w Many connections between pairs of machines

w Packets visit 0, 1, 2 … intermediate machines reaching the target one

w Alternative routes - routing algorithms

w Basically for large networks

##

10 10

87 87

(11)

Network Range

w Physical Size

w Data Flow Machines & Multicomputers are

Distributed Systems but not Computer Networks

w Local Area Networks (LANs)

w Metropolitan Area Networks

w Wide Area Networks (WANs)

w Internetworks (connection of more than one network - The Internet)

1/2

fine grain parallel com- puters; many functional units

perform any instruction

message passing sys- tems; short and fast com-

munication busses

##

11 11

87 87

(12)

Local Area Networks (LANs)

w Up to 1-2 km physical range (room, building, campus)

w Private owned (companies, branches, laboratories, small institutions)

w Connect PCs, workstations, disk stores, printers and other peripherals

w Main characteristics:

F

size

F

transmission technology

F

topology

##

12 12

87 87

(13)

Size of the LANs

w Small, technologically restricted size

w Bounded and known transmission time

w Simple network management due to the limited transmission time

##

13 13

87 87

(14)

Transmission Technology of the LANs

w Usually based on a single cable attaching all the components of the network

w Communication speed 10 - 100 Mb/S

w Communication delay 10 - 100 µS (1 µs = 1-6 S)

##

14 14

87 87

(15)

Topology of the LANs

w Topology is the graph of the connectivity of the network components

w Typical topology of LANs is bus or ring

w Bus topology is based on linear cable

w Arbitration management - time-sharing control:

1 master machine at any instant is allowed to transmit; conflict requests resolvation

w Centralized or Distributed arbitration

w EthernetTM (IEEE 802.3) standard: bus-based, distributed arbitration based on collision

detection and random delay for next attempt

1/3

##

15 15

87 87

(16)

Topology of the LANs - ring topology

w Network ring forms necklace of the workstations

w Bit-slice propagation of the packets

w IBM Token Ring (IEEE 802.5) standard operates at 4-16 Mb/S

##

16 16

87 87

(17)

Local area networks

Local area networks (LANs) are physically relatively small. They are usually spanning one km or less.

• Usually, every device on the LAN essentially shares the same transmission cable. This is called shared media

access.

Ethernet LAN technology (IEEE 802.3) has today the

largest installed base. It has several types of cabling - Thick coaxial (10-base-5) with AUI connectors and transceivers, thin coaxial (10-base-2) with BNC connectors, and

unshielded twisted pair (UTP or 10-base-T) with RJ-45 jacks.

• Each station on an Ethernet has an Ethernet network

interface card (NIC), which has a special hardware address, assigned to guarantee link layer uniqueness, even across

vendors.

• Ethernet is mostly used with speeds 10 Mbps and 100 Mbps.

##

17 17

87 87

(18)

Local area networks

Ethernet media access control allows any station on the network try to transmit at any time, which may produce collisions when several stations transmit at one time.

• Media access mechanism identifies collisions and allows each station to have adequate access to common channel.

• In Ethernet this mechanism is called carrier sense multiple access with collision detection (CSMA/CD).

• Another quite a popular LAN technology is the Token Ring specified in IEEE 802.5 with basic speed of 4 Mbps.

• The media access in Token Ring is based on token passing mechanism.

• Other IEEE 802.x standards are 802.4 Token Bus (5 and 10 Mbps) used in Manufacturing Automation Protocol (MAP) systems, and 802.6 Metropolitan Area Network (MAN),

which is also called DQDP (Distributed Queue Dual Bus) and has speed 100 Mbps.

##

18 18

87 87

(19)

Metropolitan Area Networks

w Bigger version of LANs using similar

technology - common broadcast media that connects all the computers

w Options: voice and image communications (incl. cable TV)

w No switching elements; 1 - 2 cables

w DQDB (Distributed Queue Dual Bus - IEEE 802.6) Standard: 2 unidirectional buses with 2 head-ends (for each bus) to initiate the

transmission activity in each direction. 1/4

##

19 19

87 87

(20)

Wide Area Networks (WANs)

w WAN covers large geographic area (country, continent)

w Connects different types of machines -

“hosts” via communication subnet

w Separation of the services: hosts run

application programs and subnet performs the connection tasks

w Subnet consists of transmission lines and switching elements (“routers”: specialized in connecting 2 or more switching lines)

##

20 20

87 87

(21)

WANs & Routers

w Router is specialized switching element in the WAN subnet.

w Switching is the process of:

1) receiving data on the incoming channel[s];

2) interpreting it;

3) choosing an outgoing line and 4) forwarding the data on it.

w Typical structure of WAN: hosts connected by LANs; LANs connected by the subnet

1/5

##

21 21

87 87

(22)

WANs & Subnets

w Subnet consists of routers and connection lines

w The subnet lines are based on cables

(telephone lines) that connects pairs of routers (point-to-point network) in a connected graph.

Exception: wireless/satellite based subnets

are of broadcast type (for WANs specialized in broadcasting communication)

w Non connected routers communicate via intermediate routers in store-and-forward mode

w Subnet topology - usually irregular 1/6

##

22 22

87 87

(23)

Wide area networks

w Wide area network (WAN) is a concept

that is used in context of geographically large networks (1 - 50 km span).

w Generally, WANs consist of site specific LANs and teleoperator backbones which are used to interconnect the LANs.

w This trunk capacity is provided to WANs as:

Basic analogue telephone connection with modems

Digital ISDN connection with terminal adapters (TA)

Connection with direct router support or using Frame Relay (FR)

SDH based connection with ATM.

##

23 23

87 87

(24)

Wide area networks

w Basic telephone networks support switched 64 kbps connections with either analogue modem or digital ISDN subscriber lines.

w ISDN Basic Rate Interface (BRI) consists of two bearer (B) channels and a 16 Kbps signaling (D) channel (called as 2 B + D).

w ISDN Primary Rate Interface (PRI) is a high-

bandwidth version of the BRI, also called as 30 B + D.

w Serial Line Internet Protocol (SLIP) and Point-to- Point Protocol

w (PPP) are used with the basic analogue and digital telephone interfaces as the transport layer for an

Internet link.

w SLIP/PPP connections are temporary links over standard serial phone links between end user and terminal server.

##

24 24

87 87

(25)

Wireless Networks

w Preconditions: mobile computers + digital wireless communications

w Application: portable office, transportation business, emergency services, police/

military, etc.

w Features:

C easy installation, portability

D low capacity (1-2 Mb/S), low security, high error rate + radio pollution

w Wired-Wireless Networking Convergence

w Tendencies

Laptops, PDAs binary coded radio transmission or CDPD (Cellular Digital Packet Data)

1/7

1/8

##

25 25

87 87

(26)

Internetworks

w Internetwork = Communication between LANs, MANs and WANs with different internal standards

w Compatibility requires gateways

w Typical architecture: collection of LANs connected by a WAN: (WAN

differs from the subnet just by presence of hosts besides the routers)

w The Internet = biggest internetwork

connecting universities, public and private offices, persons etc.

##

26 26

87 87

1/5

(27)

1/01/0

Communication system:

• parallel:

DMA to remote shared memory standard common bus

...

serial::

modem connection standard LAN ...

Architecture of a Distributed System / Network of computers

(28)
(29)
(30)
(31)
(32)
(33)
(34)
(35)
(36)

Network Software:

Characteristics

w Based on structural programming approach

w Network Layers: hierarchy of SW modules providing communication services to the next upper layer

w Transparency of the layered structure:

independence of layer n of the

implementation of the lower layers

##

36 36

87 87

(37)

Network Software: Structure

w Layered structure:

üProtocol - rules and convention of data exchange between layer n of host1 and layer n of host2

üPeers - entities that locally implement the functionality of a given layer

üInterface - the set of primitive operations and services that lower layer provide to the upper one

üPhysical media - the signal carrier that is used by the 1st layer for transmission

##

37 37

87 87

1/9

(38)

Network Software

w Considerations:

üVirtual exchange between the equilevel layers of two hosts according the

protocols

üPhysical exchange between the neighbor layers of one host according to the

interface

üPortability of the layers: based on clear simple interfaces and well defined set of functions of each layer

##

38 38

87 87

(39)

Network Architecture

w Network architecture - the set of layers and protocols; ignores the interfaces as the

interfaces of the hosts in a network may differ

w Protocol stack - the list of protocol

hierarchy in the network; matches the layered structure

w Analogies to the network protocol stack

##

39 39

87 87

1/10

(40)

Network Architecture

w Example network architecture:

ÿ5-layer protocol stack

êLayer 5: Application process generates message M and deposit it to Layer 4

êLayer 4: Extends M with the header H4

containing control information (ordering, size, time, etc.) and deposits H4M to Layer 3

êLayer 3: Brakes H4M into smaller fixed size

packets (e.g. H4M1 and M2); extends them with its header H3; selects an outgoing line for

transmission and passes the packets to Layer 2 êLayer 2: Adds its header and trailer to each

packet and deposit them to Layer 1 for physical transmission

##

40 40

87 87

1/11

(41)

Network Architecture

w Receiving of the message M at the destination machine consists in:

moving of its packets upward the layers,

stripping of control header and trailers,

merging the packets in a message and

interpreting the message by the application

w Lower layers have hardware implementation

w Medium layer[s] have firmware implementation

w High layers have software implementation

##

41 41

87 87

(42)

Layers Design

w Layer’s design issues:

~identification mechanism for senders/receivers - process ID, machine ID, net ID, etc.;

~data transfer mode - simplex, half-duplex and full-duplex

~support of multiple logical channels with priority scale

~Application of error-detecting and error-

correcting codes and mechanisms for feed-back

~ordering protocols for the packets in messages

~buffering between fast and slow processes

##

42 42

87 87

(43)

Connection-Oriented and Connectionless Services

w Connection-oriented service: establishes the connection from point to point; caries the exchange, preserving the order of the

bitstream and releases the connection.

Analogy to telephone system.

w Connectionless service: each message is

provided with full destination address and it is routed through the system independently to rest of message stream.

w QoS (quality of service) - reliability to losing data

##

43 43

87 87

(44)

Quality of Services (QoS)

w Implementation of reliability: based on acknowledgment by the receiver -

acknowledge receipt for each message

w Acknowledge receipts produce

communication overhead and

delays

w Application: file transfer

##

44 44

87 87

(45)

Unreliable Connection-Oriented Service

w Application for systems where delays are unacceptable, e.g. real-time systems for

w voice communication

w on-line image transmission

##

45 45

87 87

(46)

Unreliable Connectionless Service

w Application - all functions where:

real-time, interactive or on-line features are not essential but

the cost of communications has to be minimized and also

reliability is not of crucial importance w Example: standard e-mail services

w Implementation: datagrams - not

acknowledged connectionless service

##

46 46

87 87

(47)

Reliable Connectionless Service

w Application: non-interactive short messages exchange with guaranteed reliability

w Example: banking, military, remote queries in data bases

w Implementation: acknowledged datagrams

w Variation: Request-Replay services for one- cycle interaction. Mostly in remote data-

base access and another client-server applications

##

47 47

87 87

(48)

Service Primitives

w Set of operations - primitives - forms the access language to a service. Primitives:

3

request some elementary service action;

* inform the service process for some event in the peer entity

##

48 48

87 87

(49)

Confirmed and Unconfirmed Services

w Confirmed Services: the exchange of primitives between the peer entities follows the pattern:

)

request

Ï

indication

Ñ

response

Ð

confirm

w Unconfirmed Services: the exchange of

primitives between the peer entities follows the pattern:

)

request

(

indication

##

49 49

87 87

Application: basically for

(connection oriented services

reliable services

Application: basically for

* connectionless services

. unreliable services

(50)
(51)
(52)
(53)
(54)

Reference Models - Basics

w Reference models, ISO

w OSI = open systems interconnectionopen systems

w Layers:

N Perform similar functions N Process similar data

N Respect internationally standardized protocols N Minimize the information flow though the

interfaces

N Their number is the smallest possible to mach all different levels of protocol abstraction

Examples: ISO 7 layers; internet 5 layers

##

54 54

87 87

(55)

Reference Models - the OSI Model

##

55 55

87 87

w The OSI model:

F

7 layers

F

Points out the set of functions of each layer

F

Establishes international standard for all of the layers but not protocols

1/16

(56)

Protocol stacks

w OSI protocol stack

OSI-protocols are specified in seven layers. The lower layers are more hardware and transmission oriented. The upper layers are oriented to presentation and

synchronization purposes. The middle layers handle network quality, addressing and routing.

w Layers with example OSI protocols are:

Application Presentation Session Transport Network Data link Physical

FTAM, ACSE, ROSE OSI Presentation

OSI Session BSS, BSC, BAS OSI Transport Class 0,..,4 OSI Network, X.25

HDLC

Voltages as X.24 7

6 5 4 3 2 1

##

56 56

87 87

(57)

Communication Functions according to the OSI Model

User applications ..

Encryption/

decryption

compression/

expansion

Choice of syntax Session

control

Session to transport mapping

Session management Session

synch.

Layer and flow control

Error recovery

Multiplexing

Connection control

Routing Addressing

Error control

Flow control Data link

establishment

Synch Framing

Access to transm. media

Physical and electrical interface

Activation/

deactivation of con.

Application layer Presentation layer

Session layer Transport layer Network layer

Link layer Physical layer

##

57 57

87 87

(58)

The OSI Model - The Physical Layer

w

Bit-slice transmission via some communication channel e.g.

@ Method of bit coding 0/1

@ Physical parameters:

voltage/amperage etc.

@ Timing: frequency/period, shape of signal front, etc.

@ Direction[s] of transmission

@ Establishment and canceling of the connection

@ Physical/mechanical interfaces to the connection medium (e.g. RS234

connector)

##

58 58

87 87

(59)

The OSI Model - The Data Link Layer

##

59 59

87 87

Maintains the error-free error-free transmission line line for data frames serving the data frames

requests of the upper Network Layer.This includes:

braking the upper level data into or

packing the lower level bit stream into frames

frames

keeping the data sequencesequence by exchange of acknowledgement frames

create or recognize frame boundaries by bit patterns for beginning/end frame boundaries

(60)

The OSI Model - The Data Link Layer

š retransmission of corrupted or erroneous frames

š manages problems of duplicate,

corrupted or lost frames depending on the service (price/speed) level applied by the upper layers

š low level buffering between upper layers peers of different capacity

š support of bi-directional communication:

incoming data frames share the line with outgoing acknowledgement frames

š for broadcast networks: medium access sublayer for shared channel control

##

60 60

87 87

(61)

The OSI Model - The Network Layer

ww Subnet control layer i.e. Subnet routing of of therouting Data Link Layer packets from source to destination. Routing might be:

P P

static - based on static tablesstatic

— —

dynamic - new route for each sessiondynamic

j j

turbo - new revision of the route for eachturbo packet

w Routing trends to solve problems with temporarily bottlenecks

w Network layer also does the following:

##

61 61

87 87

(62)

The OSI Model - The Network Layer

ä

counts (on demand of the upper layers) the number of packets/B/b produced by

customer/network etc.

ä

interprets addresses from another conventions

ä

adjusts the packet size according to the size of peer network

##

62 62

87 87

(63)

The OSI Model - The Transport Layer

w Exchange (“transport”) of data “point-to-point-to- point

point” providing the upper (session) layer with error-free data messages. It cares for:error-free

ý effective communication - for high throughput it might open >1 network connections -

multiplexing”multiplexing ý fault tolerance

ý opening/closing the connections with named parties in the network + support of naming mechanism needed - “flow controlflow control”

ý different types of services: point-to-point channel; isolated messages; broadcasting.

##

63 63

87 87

(64)

The OSI Model - The Session Layer

w Establishes sessions between network

machines. The sessions are extensions over the transport layer communication, that

support:

:

remote login - file transfer

^ interactive exchange (dialogue):

C bi-directional simultaneous È bi-directional alternative º uni-directional

^ dialogue synchronization - by session brakes

##

64 64

87 87

(65)

The OSI Model - The Presentation Layer

w Interprets the exchanged data as information considering its syntax and semantics. This includes:

w security coding/decoding

w presenting data as text stringstext strings, formattedformatted numbers

numbers (integers, fixed, floating, double, etc.) according different formatting codes in both directions:

local computer standard

network standard

##

65 65

87 87

(66)

The OSI Model - The Application Layer

w Set of protocols providing network-wide compatibility of the user programs

including:

7 full-screen terminal compatibility

> file- and directory- structure compatibility

remote procedure calls/remote evaluation

- electronic mail

………….

w Solution: network virtual standard to which to translate local structures/objects

##

66 66

87 87

(67)

The OSI Model - example Data Transmission

w Sender transmits Data to Receiver

w The protocols implementing each OSI layer add special header to the Data (header

might be null)

w The lower level deals with extended Data (Data+Header) as a whole

##

67 67

87 87

1/17

(68)

Reference Models - the TCP/IP Model

µ Developed for ARPANET (70ties US

national military network) and inherited in the Internet

J Features:

B

flexible routing - tolerant to loss of network nodes, subnets, route[r]s, connections, etc.

é

flexible architecture - tolerant to different throughput and application services (off-line, on-line, real-time)

Ê

4-layer structure

##

68 68

87 87

1/18

(69)

Protocol stacks

TCP/IP stack

• Internet networks are based on TCP/IP protocols, so the TCP/IP model and protocol stack have a growing

importance.

• TCP/IP is based on five protocol layers instead of seven.

The OSI model session and presentation layers can be considered empty in TCP/IP context.

• TCP/IP stack with example protocols is shown below:

Application Transport Network Data link

Telnet, FTP, SMTP, SNMP, HTTP TCP, UDP

IP

HDLC or LAN frames Voltage levels

Physical

7 4 3 2 1

##

69 69

87 87

(70)

TCP/IP Layered communication

Client Server

Router Telnet request

TCP segment IP datagram Ethernet frame

Voltage

Telnet request TCP segment

IP datagram Ethernet frame

Voltage IP datagram

Ethernet frame Voltage

##

70 70

87 87

(71)

The TCP/IP Model - The

“Host/Network Layer”

w Corresponds to OSI Physical+Data Link Layers

w Unspecified strictly as protocol

w implementations vary in different networks and even hosts

w only restriction: serving upper (internet) layer in transmission of data packets

##

71 71

87 87

(72)

The TCP/IP Model - The Internet Layer

w Connectionless layer (in order to provide the flexibility needed)

w Implementation: IPIP

w free independent exchange of packets (IP datagrams) transparently to the sender and receiver Üroutingrouting is a key issue in IP

w standard packet format (strictly supported)packet format for proper routing

w corresponds to OSI Network Layer

##

72 72

87 87

(73)

The TCP/IP Model - The Transport Layer

w Supports “point-to-point” connectivity

between the source and destination (like OSI transport layer)

w Implemented by two protocols:

J J

TCP (Transmission Control Protocol) -TCP

connection oriented, delivers the byte stream from source to destination by fragmentation into discrete messages for transmission by IP.

Receiving TCP assembles the incoming messages to output stream

L L

UDP (User Datagram Protocol) -UDP

connectionless, unreliable, non-sequential, for prompt delivery (multimedia applications)

##

73 73

87 87

(74)

The TCP/IP Model - The Application Layer

w Top level protocols (session and

presentation layer functions are performed by the application when needed) like:

:

TELNET

<

FTP

-

SMTP

5

DNS

û

HTTP

……...

##

74 74

87 87

1/19

(75)

Reference Models - OSI vs.

TCP/IP

w Similarities:

structure: stack of protocolsstructure

functionality: routing + point-to-pointfunctionality

connectivity + application supporting functions w Dissimilarities (OSI)/(TCP):

conceptuality/applicability

hidden, transparent, replaceable protocols / conservative, non-conceptual approach

mostly connection oriented / pure connectionless oriented

7 layers / 4 layers

##

75 75

87 87

1/18

(76)

Example Networks - The

ARPANET

w [Defense] Advance Research Project Agency - consists of subnet and hosts

w Subnet is based Interface Message Processors (IMP) connected by communication lines.

Software: IMP/IMP- Host/IMP- and Host/Host- protocols

w Development - chiefly US universities: 1969, 70, 72, 73

w Extensions: Terminal Interface Processors (TIP) (Terminal Complexes), LANs, TCP/IP (protocol stack and model -1974), DNS (1981)

##

76 76

87 87

1/24 1/25

(77)

Example Networks - The

ARPANET

[Defense] Advance Research Project Agency - first to adopt packet-switchingpacket-switching replacing

traditional circuit-switching. Advantages:

multiple routes rise fault-tolerance (dated) dense communication channels (actual)

Structure: subnetsubnet and hostshosts

Subnet structure: Interface Message ProcessorsInterface Message Processors (IMP) connected by communication lines;

Alternative connections for each IMP

Software: IMP/IMP- Host/IMP- and Host/Host-

protocols based on datagram exchange; rerouting algorithms for lost datagrams.

##

77 77

87 87

1/24

(78)

Example Networks - The

ARPANET

w Development - chiefly US universities: 1969, 70, 72, 73

w Extensions:

Terminal Interface Processors (TIP) (Terminal Complexes) - multiple host per TIP, multiplexed access of one host to several TIPs

LANs

TCP/IP (protocol stack and model -1974) suitable for mobile networks where a host can be switched to different networks of the subnet; since 1983 the only protocol stack of ARPANET

DNS (1981) organization of host domains, namind all the hosts and mapping onto list of IP addresses

w Early 90’s ARPANET melted in arising Internet space

##

78 78

87 87

1/25

(79)

Example Networks - The

Internet

The Internet arises on base of ARPANET after joining of another regional networks - NSFNET, BITNET, EARN, …, thousands of LANs; early 90’ the term “internet” widely accepted as net name “The Internet”

Internet machine is each machine that (1) inter- communicates with others under TCP/IP and (2) has a specific IP address

Classic applications: mail, news, remote login and file transfer

“New wave” applications: from gophers to WWW surfing

##

79 79

87 87

(80)

Example Networks - Gigabit Implementations

w Next step after 102Mb Internet backbones

w Specific Applications: Teleservices (on- line transmission of huge data arrays)

especially televideoservices, cable TV to net, etc.

G

Note: not always faster, but better

bandwidth - for mass communications

w Implementations: mainly Ethernet LANs and ATM switches: 3Com® (1000 megabits per second (Mbps) Gigabit Ethernet networking infrastructure around eleven 3Com CoreBuilder 9000 enterprise switches).

##

80 80

87 87

(81)
(82)
(83)
(84)
(85)
(86)
(87)

Viittaukset

LIITTYVÄT TIEDOSTOT

For transport NbUp over IP network, RTP over UDP over IP (IPV4 or IPV6) shall be used. Figure 4.15 shows the protocol stack for transport network user plane on the Nb interface. The

Unlike the OSI which is made up of seven different layers namely physical, data- link, network, transport, session, presentation and the application layers, the HART communication

QLLQ IVFFRGH

• the state created at a transport layer uses the IP and transport protocol port number to deliver data to a correct ap- plication.. • the network layer uses the destination IP

Transport layer raises the service provided by the network layer to the level required by the session layer providing reliable end-to-end transport service. Network layer is

• Implementations of protocol stacks often co-exist (OSI X.500 directory system over TCP/IP, TCP/IP communications over telephone network and SS7)...

• The network management application on the network manage- ment workstation (client) communicates with the management agents of the managed systems (servers) using SNMP. •

Layered Software Architecture was used to develop application by dividing the whole ap- plication into Presentation Layer, Data Access Layer, Business Logic Layer and